CVE-2017-12855

Summary

CVECVE-2017-12855
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2017-08-15 16:29:00 UTC
Updated2017-11-15 02:29:00 UTC
DescriptionXen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.

Risk And Classification

Problem Types: CWE-200

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Xen Xen 4.5.0 All All All
Operating System Xen Xen 4.5.1 All All All
Operating System Xen Xen 4.5.2 All All All
Operating System Xen Xen 4.5.3 All All All
Operating System Xen Xen 4.5.5 All All All
Operating System Xen Xen 4.6.0 All All All
Operating System Xen Xen 4.6.1 All All All
Operating System Xen Xen 4.6.3 All All All
Operating System Xen Xen 4.6.4 All All All
Operating System Xen Xen 4.6.5 All All All
Operating System Xen Xen 4.6.6 All All All
Operating System Xen Xen 4.7.0 All All All
Operating System Xen Xen 4.7.1 All All All
Operating System Xen Xen 4.7.2 All All All
Operating System Xen Xen 4.7.3 All All All
Operating System Xen Xen 4.8.0 All All All
Operating System Xen Xen 4.8.1 All All All
Operating System Xen Xen 4.9.0 All All All
Operating System Xen Xen 4.5.0 All All All
Operating System Xen Xen 4.5.1 All All All
Operating System Xen Xen 4.5.2 All All All
Operating System Xen Xen 4.5.3 All All All
Operating System Xen Xen 4.5.5 All All All
Operating System Xen Xen 4.6.0 All All All
Operating System Xen Xen 4.6.1 All All All
Operating System Xen Xen 4.6.3 All All All
Operating System Xen Xen 4.6.4 All All All
Operating System Xen Xen 4.6.5 All All All
Operating System Xen Xen 4.6.6 All All All
Operating System Xen Xen 4.7.0 All All All
Operating System Xen Xen 4.7.1 All All All
Operating System Xen Xen 4.7.2 All All All
Operating System Xen Xen 4.7.3 All All All
Operating System Xen Xen 4.8.0 All All All
Operating System Xen Xen 4.8.1 All All All
Operating System Xen Xen 4.9.0 All All All

References

ReferenceSourceLinkTags
Xen CVE-2017-12855 Local Information Disclosure Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
Citrix XenServer Multiple Security Updates CONFIRM support.citrix.com
Xen Premature GTF Bit Clearing Lets Local Users on a Guet System Obtain Potentially Sensitive Information From Other Guest Systems - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
Debian -- Security Information -- DSA-3969-1 xen DEBIAN www.debian.org
XSA-230 - Xen Security Advisories CONFIRM xenbits.xen.org Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 500817 Alpine Linux Security Update for xen
  • 504560 Alpine Linux Security Update for xen
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report